Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Shade/Troldesh Ransomware Detection (HTTP)

Information

Severity

Severity

Critical

Family

Family

Malware

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Workaround

Created

Created

5 years ago

Modified

Modified

5 years ago

Summary

The remote host seems to be hosting files within hidden directories used to spread the Shade/Troldesh ransomware.

Insight

Insight

In 2019 it was found that unknown threat actors are known to target WordPress and Jommla installation via known vulnerabilities with the goal to misuse the target system to host files of the Shade/Troldesh ransomware for various hacking and phishing campaings.

Detection Method

Detection Method

Sends HTTP GET requests to various known Indicator of Compromise (IOC) files within the /.well-known/acme-challenge/ and /.well-known/pki-validation/ folders and checks the response.

Solution

Solution

A whole cleanup of the infected system is recommended.